Question
click below
click below
Question
Normal Size Small Size show me how
CCNA1
FINALS pt.2
Question | Answer |
---|---|
A client packet is received by a server. The packet has a destination port number of 67. What service is the client requesting? | DHCP |
What are two problems that can be caused by a large number of ARP request and reply messages? | All ARP request messages must be processed by all nodes on the local network. |
What are two problems that can be caused by a large number of ARP request and reply messages? | The ARP request is sent as a broadcast, and will flood the entire subnet. |
During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry? | switch the packet to the directly connected interface |
What characteristic describes antispyware? | applications that protect end devices from becoming infected with malicious software |
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? | SSH |
What are the two most effective ways to defend against malware? (Choose two.) | Update the operating system and other application software. & Install and update antivirus software. |
Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall? | Trojan horse |
is software that does something harmful, but is hidden in legitimate software code. | Trojan horse |
attack results in interruption of network services to users, network devices, or applications. | denial of service (DoS) |
commonly involves trying to access a network device. | brute-force attack |
occurs when a program attempts to store more data in a memory location than it can hold. | buffer overflow |
Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss? | frame check sequence field |
A network administrator is adding a new LAN to a branch office. The new LAN must support 4 connected devices. What is the smallest network mask that the network administrator can use for the new network? | 255.255.255.248 |
. What service is provided by POP3? | Retrieves email from the server by downloading the email to the local mail application of the client. |
What two security solutions are most likely to be used only in a corporate environment? (Choose two.) | virtual private networks & intrusion prevention systems |
What characteristic describes antivirus software? | applications that protect end devices from becoming infected with malicious software |
What mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network? | It decrements the value of the TTL field by 1 and if the result is 0, it discards the packet and sends a Time Exceeded message to the source host. |
A client packet is received by a server. The packet has a destination port number of 69. What service is the client requesting? | TFTP |
An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet? | all IPv6 configured routers on the local link |
What are the three parts of an IPv6 global unicast address? (Choose three.) | subnet ID, global routing prefix , interface ID |
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? | interference, security, coverage area |
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? | Exit privileged EXEC mode and press Enter . |
What method is used to manage contention-based access on a wireless network? | CSMA/CA |
What is a function of the data link layer? | provides for the exchange of frames over a common local media |
What is the purpose of the TCP sliding window? | to request that a source decrease the rate at which it transmits data |
allows a destination device to inform a source to slow down the rate of transmission. | TCP sliding window |
What characteristic describes spyware? | software that is installed on a user device and collects information about the user |
Which switching method drops frames that fail the FCS check? | store-and-forward switching |
Which range of link-local addresses can be assigned to an IPv6-enabled interface? | FE80::/10 |
What service is provided by FTP? | Allows for data transfers between a client and a file server. |
A user is attempting to access without success. Which two configuration values must be set on the host to allow this access? (Choose two.) | DNS server, default gateway |
Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) | NAT introduces problems for some applications that require end-to-end connectivity. & NAT provides a solution to slow down the IPv4 address depletion. |
is a technology that is implemented within IPv4 networks. | Network Address Translation (NAT) |
What would be the interface ID of an IPv6 enabled interface with a MAC address of 1C-6F-65-C2-BD-F8 when the interface ID is generated by using the EUI-64 process? | 1E6F:65FF:FEC2:BDF8 |
What service is provided by BOOTP? | Legacy application that enables a diskless workstation to discover its own IP address and find a BOOTP server on the network. |
What characteristic describes adware? | software that is installed on a user device and collects information about the user |
When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the switch revert when the error threshold is reached? | store-and-forward |
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) | accessing the media & data encapsulation |
This field checks if the frame has been damaged during the transfer | error detection |
this field helps to direct the frame towards its destination | addressing |
this fields identifies the beginning of a frame | frame start |
this field is used by the LLC to identify the layer 3 protocol | type |
What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64? | 2001:DA48:FC5:A4::/64 |
FIREWALL FUNCTION: prevents access based on IP or MAC address | packet filtering |
FIREWALL FUNCTION: prevents access to websites | URL filtering |
FIREWALL FUNCTION: prevents unsolicited incoming sessions | stateful packet inspection |
FIREWALL FUNCTION: prevents access by port number | application filtering |
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? | the network performance baseline |
How does the service password-encryption command enhance password security on Cisco routers and switches? | It encrypts passwords that are stored in router or switch configuration files. |
Which two statements are correct in a comparison of IPv4 and IPv6 packet headers? (Choose two.) | The Source Address field name from IPv4 is kept in IPv6. & The Time-to-Live field from IPv4 has been replaced by the Hop Limit field in IPv6. |
What characteristic describes identity theft? | the use of stolen credentials to access private data |
A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? | 255.255.255.0 |
1. What are three commonly followed standards for constructing and installing cabling? | cable lengths |
2. What are three commonly followed standards for constructing and installing cabling? | pinouts, |
3.What are three commonly followed standards for constructing and installing cabling? | connector types |
A client packet is received by a server. The packet has a destination port number of 143. What service is the client requesting? | IMAP |
1.What are two characteristics shared by TCP and UDP? | port numbering |
2. What are two characteristics shared by TCP and UDP? | use of checksum |
A client packet is received by a server. The packet has a destination port number of 21. What service is the client requesting? | FTP |
What attribute of a NIC would place it at the data link layer of the OSI model? | MAC address |